Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multimedia and Learning: Patterns of Interaction., and . BCS HCI, page 375-388. Springer, (2000)Transitioning from Product Line Requirements to Product Line Architecture., , , and . COMPSAC (1), page 186-195. IEEE Computer Society, (2005)From product line requirements to product line architecture: optimizing industrial product lines for new competitive advantage., and . SPLC, volume 446 of ACM International Conference Proceeding Series, page 315. ACM, (2009)Using Binary Strings for Comparing Products from Software-intensive Systems Product Lines., and . ICEIS (2), page 257-266. SCITEPRESS, (2021)An Intelligent Agent Security Intrusion System., , , and . ECBS, page 94-. IEEE Computer Society, (2002)Software reuse and mass customisation: feature modelling vs. case-based reasoning., and . SPLC, page 304. ACM, (2018)A Weakly-Supervised Surface Crack Segmentation Method using Localisation with a Classifier and Thresholding., , , , and . CoRR, (2021)Using First-Order Logic for Product Line Model Validation.. SPLC, volume 2379 of Lecture Notes in Computer Science, page 176-187. Springer, (2002)Theorem Proving for Product Line Model Verification., and . PFE, volume 3014 of Lecture Notes in Computer Science, page 211-224. Springer, (2003)Combining Different Product Line Models to Balance Needs of Product Differentiation and Reuse., , , and . ICSR, volume 5030 of Lecture Notes in Computer Science, page 116-129. Springer, (2008)